Which three areas of the IBM Security Framework are mainly covered by the legacy Tivoli products?
A. Application and Process, Network Server and End Point, Physical Infrastructure.
B. Data and Information, Application and Process, Network Server and End Point.
C. People and Identity, Data and Information. Network Server and End Point
D. People and Identity, Data and Information, Application and Process.
正解:D
質問 2:
What are the three pillars of the IBM Security Framework?
A. Threat Mitigation Services, Data Security Services, and IBM Security Products.
B. IBM Security Products, Professional Security Services, and Managed Security Services.
C. Professional Security Services, Managed Security Services, and Business Continuity Services.
D. Managed Security Services, IBM Security Products, and Tier 1 OEM Security Vendors.
正解:B
質問 3:
What are the key security features of IBM Security Virtual Server Protection for VMWare?
A. Rootkit Detection, Firewall, Intrusion Detection Only, Virtual Network Admission Control. Auditing
B. Rootkit Detection, Firewall, Intrusion Prevention, Virtual Network Admission Control, Auditing.
C. Rootkit Detection, Firewall, Intrusion Prevention, Virtual Network Admission Control, File Integrity Monitoring
D. Rootkit Detection & Removal, Firewall, Intrusion Prevention, Virtual Network Admission Control. Auditing.
正解:B
質問 4:
A large industrial client is currently evaluating IPS technology. The important issues are network up-time and false positives disrupting the client's business partner connections. What is the most appropriate IBM Security technology for this client?
A. Centralized command and control of IPS through IBM Security SiteProtector.
B. IBM Security MX0804 with the IPS agent actively configured.
C. IBM Security GX appliance where simulation mode can be leveraged
D. IBM Security Server.
正解:C
質問 5:
What best describes the work of IBM Security's X-Force Research and Development team?
A. Providing in-depth security research, which is at the core of all IBM Security products and services.
B. Using the global reach of security operations centers, and the ear-to-the-ground intelligence obtained through Managed Security Services to provide analysis.
C. Providing IBM Security with the ability to stop threats because of its knowledge base of information-understanding the tools and techniques used to create attacks and collaborating with government agencies, industry consortia, and software developers.
D. Discovering and analyzing previously unknown vulnerabilities in critical software and infrastructure such as: e-mail, networks, Internet applications, security protocols, business applications and VoIP.
正解:D
かわ** -
Pass4Testの問題集はとにかくやさしく解説しています。だからわかりやすかったし、合格しました。